common.pm 58 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617
  1. package eyelib::common;
  2. #
  3. # Copyright (C) Roman Dmitriev, rnd@rajven.ru
  4. #
  5. use utf8;
  6. use open ":encoding(utf8)";
  7. use strict;
  8. use English;
  9. use FindBin '$Bin';
  10. use lib "/opt/Eye/scripts";
  11. use base 'Exporter';
  12. use vars qw(@EXPORT @ISA);
  13. use eyelib::config;
  14. use eyelib::main;
  15. use Net::Patricia;
  16. use eyelib::net_utils;
  17. use Data::Dumper;
  18. use eyelib::database;
  19. use DateTime;
  20. use POSIX qw(mktime ctime strftime);
  21. use File::Temp qw(tempfile);
  22. use DBI;
  23. our @ISA = qw(Exporter);
  24. our @EXPORT = qw(
  25. apply_device_lock
  26. create_dns_cname
  27. create_dns_hostname
  28. create_dns_ptr
  29. delete_device
  30. delete_dns_cname
  31. delete_dns_hostname
  32. delete_dns_ptr
  33. delete_user
  34. delete_user_auth
  35. find_mac_in_subnet
  36. get_default_ou
  37. get_device_by_ip
  38. get_dns_name
  39. get_dynamic_ou
  40. get_first_line
  41. get_ip_subnet
  42. get_new_user_id
  43. get_notify_subnet
  44. GetNowTime
  45. get_office_subnet
  46. get_subnets_ref
  47. GetTimeStrByUnixTime
  48. GetUnixTimeByStr
  49. is_ad_computer
  50. is_default_ou
  51. is_dynamic_ou
  52. is_hotspot
  53. new_auth
  54. new_user
  55. process_dhcp_request
  56. recalc_quotes
  57. record_to_txt
  58. resurrection_auth
  59. set_changed
  60. set_lock_discovery
  61. unbind_ports
  62. unblock_user
  63. unset_lock_discovery
  64. update_dns_record
  65. update_dns_record_by_dhcp
  66. );
  67. BEGIN
  68. {
  69. #---------------------------------------------------------------------------------------------------------------
  70. sub get_first_line {
  71. my $msg = shift;
  72. if (!$msg) { return; }
  73. if ($msg=~ /(.*)(\n|\<br\>)/) {
  74. $msg = $1 if ($1);
  75. chomp($msg);
  76. }
  77. return $msg;
  78. }
  79. #---------------------------------------------------------------------------------------------------------------
  80. sub unbind_ports {
  81. my $db = shift;
  82. my $device_id = shift;
  83. return if (!$db);
  84. return if (!$device_id);
  85. my @target = get_records_sql($db, "SELECT U.target_port_id,U.id FROM device_ports U WHERE U.device_id=".$device_id);
  86. foreach my $row (@target) {
  87. do_sql($db, "UPDATE device_ports SET target_port_id=0 WHERE target_port_id=".$row->{id});
  88. do_sql($db, "UPDATE device_ports SET target_port_id=0 WHERE id=".$row->{id});
  89. }
  90. }
  91. #---------------------------------------------------------------------------------------------------------------
  92. sub get_dns_name {
  93. my $db = shift;
  94. my $id = shift;
  95. my $auth_record = get_record_sql($db,"SELECT dns_name FROM user_auth WHERE deleted=0 AND id=".$id);
  96. if ($auth_record and $auth_record->{'dns_name'}) { return $auth_record->{'dns_name'}; }
  97. return;
  98. }
  99. #---------------------------------------------------------------------------------------------------------------
  100. sub record_to_txt {
  101. my $db = shift;
  102. my $table = shift;
  103. my $id = shift;
  104. my $record = get_record_sql($db,'SELECT * FROM '.$table.' WHERE id='.$id);
  105. return hash_to_text($record);
  106. }
  107. #---------------------------------------------------------------------------------------------------------------
  108. sub delete_user_auth {
  109. my $db = shift;
  110. my $id = shift;
  111. my $record = get_record_sql($db,'SELECT * FROM user_auth WHERE id='.$id);
  112. my $auth_ident = $record->{ip};
  113. $auth_ident = $auth_ident . '['.$record->{dns_name} .']' if ($record->{dns_name});
  114. $auth_ident = $auth_ident . ' :: '.$record->{description} if ($record->{dns_name});
  115. my $msg = "";
  116. my $txt_record = hash_to_text($record);
  117. #remove aliases
  118. my @t_user_auth_alias = get_records_sql($db,'SELECT * FROM user_auth_alias WHERE auth_id='.$id);
  119. if (@t_user_auth_alias and scalar @t_user_auth_alias) {
  120. foreach my $row ( @t_user_auth_alias) {
  121. my $alias_txt = record_to_txt($db,'user_auth_alias','id='.$row->{'id'});
  122. if (delete_record($db,'user_auth_alias','id='.$row->{'id'})) {
  123. $msg = "Deleting an alias: ". $alias_txt . "\n::Success!\n" . $msg;
  124. } else {
  125. $msg = "Deleting an alias: ". $alias_txt . "\n::Fail!\n" . $msg;
  126. }
  127. }
  128. }
  129. #remove connections
  130. do_sql($db,'DELETE FROM connections WHERE auth_id='.$id);
  131. #remove user auth record
  132. my $changes = delete_record($db, "user_auth", "id=" . $id);
  133. if ($changes) {
  134. $msg = "Deleting ip-record: ". $txt_record . "\n::Success!\n" . $msg;
  135. } else {
  136. $msg = "Deleting ip-record: ". $txt_record . "\n::Fail!\n" . $msg;
  137. }
  138. $msg = "Deleting user ip record $auth_ident\n\n".$msg;
  139. db_log_warning($db, $msg, $id);
  140. my $send_alert = isNotifyDelete(get_notify_subnet($db,$record->{ip}));
  141. sendEmail("WARN! ".get_first_line($msg),$msg,1) if ($send_alert);
  142. return $changes;
  143. }
  144. #---------------------------------------------------------------------------------------------------------------
  145. sub unblock_user {
  146. my $db = shift;
  147. my $user_id = shift;
  148. my $user_record = get_record_sql($db,'SELECT * FROM user_list WHERE id='.$user_id);
  149. my $user_ident = 'id:'. $user_record->{'id'} . ' '. $user_record->{'login'};
  150. $user_ident = $user_ident . '[' . $user_record->{'fio'} . ']' if ($user_record->{'fio'});
  151. my $msg = "Amnistuyemo blocked by traffic user $user_ident \nInternet access for the user's IP address has been restored:\n";
  152. my @user_auth = get_records_sql($db,'SELECT * FROM user_auth WHERE deleted=0 AND user_id='.$user_id);
  153. my $send_alert = 0;
  154. if (@user_auth and scalar @user_auth) {
  155. foreach my $record (@user_auth) {
  156. $send_alert = ($send_alert or isNotifyUpdate(get_notify_subnet($db,$record->{ip})));
  157. my $auth_ident = $record->{ip};
  158. $auth_ident = $auth_ident . '['.$record->{dns_name} .']' if ($record->{dns_name});
  159. $auth_ident = $auth_ident . ' :: '.$record->{description} if ($record->{dns_name});
  160. my $new;
  161. $new->{'blocked'}=0;
  162. $new->{'changed'}=1;
  163. my $ret_id = update_record($db,'user_auth',$new,'id='.$record->{'id'});
  164. if ($ret_id) {
  165. $msg = $msg ."\n".$auth_ident;
  166. }
  167. }
  168. }
  169. my $new;
  170. $new->{'blocked'}=0;
  171. my $ret_id = update_record($db,'user_list','id='.$user_id);
  172. if ($ret_id) {
  173. db_log_info($db,$msg);
  174. sendEmail("WARN! ".get_first_line($msg),$msg,1) if ($send_alert);
  175. }
  176. return $ret_id;
  177. }
  178. #---------------------------------------------------------------------------------------------------------------
  179. sub delete_user {
  180. my $db = shift;
  181. my $id = shift;
  182. #remove user record
  183. my $changes = delete_record($db, "user_list", "id=" . $id);
  184. #if fail - exit
  185. if (!$changes) { return; }
  186. #remove auth records
  187. my @t_user_auth = get_records_sql($db,'SELECT * FROM user_auth WHERE user_id='.$id);
  188. if (@t_user_auth and scalar @t_user_auth) {
  189. foreach my $row ( @t_user_auth ) { delete_user_auth($db,$row->{'id'}); }
  190. }
  191. #remove device
  192. my $device = get_record_sql($db, "SELECT * FROM devices WHERE user_id=".$id);
  193. if ($device) { delete_device($db,$device->{'id'}); }
  194. #remove auth assign rules
  195. do_sql($db, "DELETE FROM auth_rules WHERE user_id=$id");
  196. return $changes;
  197. }
  198. #---------------------------------------------------------------------------------------------------------------
  199. sub delete_device {
  200. my $db = shift;
  201. my $id = shift;
  202. #remove user record
  203. my $changes = delete_record($db, "devices", "id=" . $id);
  204. #if fail - exit
  205. if (!$changes) { return; }
  206. unbind_ports($db, $id);
  207. do_sql($db, "DELETE FROM connections WHERE device_id=" . $id);
  208. do_sql($db, "DELETE FROM device_l3_interfaces WHERE device_id=" . $id);
  209. do_sql($db, "DELETE FROM device_ports WHERE device_id=" . $id);
  210. do_sql($db, "DELETE FROM device_filter_instances WHERE device_id=" . $id);
  211. do_sql($db, "DELETE FROM gateway_subnets WHERE device_id=".$id);
  212. return $changes;
  213. }
  214. #---------------------------------------------------------------------------------------------------------------
  215. sub is_hotspot {
  216. my $db = shift;
  217. my $ip = shift;
  218. my $users = new Net::Patricia;
  219. #check hotspot
  220. my @ip_rules = get_records_sql($db,'SELECT * FROM subnets WHERE hotspot=1 AND LENGTH(subnet)>0');
  221. foreach my $row (@ip_rules) { $users->add_string($row->{subnet}); }
  222. if ($users->match_string($ip)) { return 1; }
  223. return 0;
  224. }
  225. #---------------------------------------------------------------------------------------------------------------
  226. sub get_office_subnet {
  227. my $db = shift;
  228. my $ip = shift;
  229. my $subnets = new Net::Patricia;
  230. my @ip_rules = get_records_sql($db,'SELECT * FROM subnets WHERE office=1 AND LENGTH(subnet)>0');
  231. foreach my $row (@ip_rules) { $subnets->add_string($row->{subnet},$row); }
  232. return $subnets->match_string($ip);
  233. }
  234. #---------------------------------------------------------------------------------------------------------------
  235. sub get_notify_subnet {
  236. my $db = shift;
  237. my $ip = shift;
  238. my $notify_flag = get_office_subnet($db,$ip);
  239. if ($notify_flag) { return $notify_flag->{notify}; }
  240. return 0;
  241. }
  242. #---------------------------------------------------------------------------------------------------------------
  243. sub get_new_user_id {
  244. my $db = shift;
  245. my $ip = shift;
  246. my $mac = shift;
  247. my $hostname = shift;
  248. my $result;
  249. #check user rules
  250. $mac = mac_simplify($mac);
  251. $result->{ip} = $ip;
  252. $result->{mac} = mac_splitted($mac);
  253. $result->{dhcp_hostname} = $hostname;
  254. $result->{ou_id}=undef;
  255. $result->{user_id}=undef;
  256. my $hotspot_users = new Net::Patricia;
  257. #check hotspot
  258. my @hotspot_rules = get_records_sql($db,'SELECT * FROM subnets WHERE hotspot=1 AND LENGTH(subnet)>0');
  259. foreach my $row (@hotspot_rules) { $hotspot_users->add_string($row->{subnet},$default_hotspot_ou_id); }
  260. if ($hotspot_users->match_string($ip)) { $result->{ou_id}=$hotspot_users->match_string($ip); return $result; }
  261. #check ip
  262. if (defined $ip and $ip) {
  263. my $users = new Net::Patricia;
  264. #check ip rules
  265. my @ip_rules = get_records_sql($db,'SELECT * FROM auth_rules WHERE rule_type=1 and LENGTH(rule)>0 AND user_id IS NOT NULL');
  266. foreach my $row (@ip_rules) { eval { $users->add_string($row->{rule},$row->{user_id}); }; }
  267. if ($users->match_string($ip)) { $result->{user_id}=$users->match_string($ip); return $result; }
  268. }
  269. #check mac
  270. if (defined $mac and $mac) {
  271. my @user_rules=get_records_sql($db,'SELECT * FROM auth_rules WHERE rule_type=2 AND LENGTH(rule)>0 AND user_id IS NOT NULL');
  272. foreach my $user (@user_rules) {
  273. my $rule = mac_simplify($user->{rule});
  274. if ($mac=~/$rule/i) { $result->{user_id}=$user->{user_id}; return $result; }
  275. }
  276. }
  277. #check hostname
  278. if (defined $hostname and $hostname) {
  279. my @user_rules=get_records_sql($db,'SELECT * FROM auth_rules WHERE rule_type=3 AND LENGTH(rule)>0 AND user_id IS NOT NULL');
  280. foreach my $user (@user_rules) {
  281. if ($hostname=~/$user->{rule}/i) { $result->{user_id}=$user->{user_id}; return $result; }
  282. }
  283. }
  284. #check ou rules
  285. #check ip
  286. if (defined $ip and $ip) {
  287. my $users = new Net::Patricia;
  288. #check ip rules
  289. my @ip_rules = get_records_sql($db,'SELECT * FROM auth_rules WHERE rule_type=1 and LENGTH(rule)>0 AND ou_id IS NOT NULL');
  290. foreach my $row (@ip_rules) { eval { $users->add_string($row->{rule},$row->{ou_id}); }; }
  291. if ($users->match_string($ip)) { $result->{ou_id}=$users->match_string($ip); return $result; }
  292. }
  293. #check mac
  294. if (defined $mac and $mac) {
  295. my @user_rules=get_records_sql($db,'SELECT * FROM auth_rules WHERE rule_type=2 AND LENGTH(rule)>0 AND ou_id IS NOT NULL');
  296. foreach my $user (@user_rules) {
  297. my $rule = mac_simplify($user->{rule});
  298. if ($mac=~/$rule/i) { $result->{ou_id}=$user->{ou_id}; return $result; }
  299. }
  300. }
  301. #check hostname
  302. if (defined $hostname and $hostname) {
  303. my @user_rules=get_records_sql($db,'SELECT * FROM auth_rules WHERE rule_type=3 AND LENGTH(rule)>0 AND ou_id IS NOT NULL');
  304. foreach my $user (@user_rules) {
  305. if ($hostname=~/$user->{rule}/i) { $result->{ou_id}=$user->{ou_id}; return $result; }
  306. }
  307. }
  308. if (!$result->{ou_id}) { $result->{ou_id}=$default_user_ou_id; }
  309. return $result;
  310. }
  311. #---------------------------------------------------------------------------------------------------------------
  312. sub set_changed {
  313. my $db = shift;
  314. my $id = shift;
  315. return if (!$db or !$id);
  316. my $update_record;
  317. $update_record->{changed}=1;
  318. update_record($db,'user_auth',$update_record,"id=$id");
  319. }
  320. #---------------------------------------------------------------------------------------------------------------
  321. sub update_dns_record {
  322. my $hdb = shift;
  323. my $auth_id = shift;
  324. return if (!$config_ref{enable_dns_updates});
  325. # Переподключение
  326. if (!$hdb or !$hdb->ping) { $hdb = init_db(); }
  327. #get domain
  328. my $ad_zone = get_option($hdb,33);
  329. #get dns server
  330. my $ad_dns = get_option($hdb,3);
  331. my $enable_ad_dns_update = ($ad_zone and $ad_dns and $config_ref{enable_dns_updates});
  332. log_debug("Auth id: ".$auth_id);
  333. log_debug("enable_ad_dns_update: ".$enable_ad_dns_update);
  334. log_debug("DNS update flags - zone: ".$ad_zone.", dns: ".$ad_dns.", enable_ad_dns_update: ".$enable_ad_dns_update);
  335. my @dns_queue = get_records_sql($hdb,"SELECT * FROM dns_queue WHERE auth_id=".$auth_id." AND value>'' AND value NOT LIKE '%.'ORDER BY id ASC");
  336. if (!@dns_queue or !scalar @dns_queue) { return; }
  337. foreach my $dns_cmd (@dns_queue) {
  338. my $fqdn = '';
  339. my $fqdn_ip = '';
  340. my $fqdn_parent = '';
  341. my $static_exists = 0;
  342. my $static_ref = '';
  343. my $static_ok = 0;
  344. eval {
  345. if ($dns_cmd->{name_type}=~/^cname$/i) {
  346. #skip update unknown domain
  347. if ($dns_cmd->{name} =~/\.$/ or $dns_cmd->{value} =~/\.$/) { next; }
  348. $fqdn=lc($dns_cmd->{name});
  349. $fqdn=~s/\.$ad_zone$//i;
  350. # $fqdn=~s/\.$//;
  351. if ($dns_cmd->{value}) {
  352. $fqdn_parent=lc($dns_cmd->{value});
  353. $fqdn_parent=~s/\.$ad_zone$//i;
  354. # $fqdn_parent=~s/\.$//;
  355. }
  356. $fqdn = $fqdn.".".$ad_zone;
  357. $fqdn_parent = $fqdn_parent.".".$ad_zone;
  358. #remove cname
  359. if ($dns_cmd->{operation_type} eq 'del') {
  360. delete_dns_cname($fqdn_parent,$fqdn,$ad_zone,$ad_dns,$hdb);
  361. }
  362. #create cname
  363. if ($dns_cmd->{operation_type} eq 'add') {
  364. create_dns_cname($fqdn_parent,$fqdn,$ad_zone,$ad_dns,$hdb);
  365. }
  366. }
  367. if ($dns_cmd->{name_type}=~/^a$/i) {
  368. #skip update unknown domain
  369. if ($dns_cmd->{name} =~/\.$/ or $dns_cmd->{value} =~/\.$/) { next; }
  370. $fqdn=lc($dns_cmd->{name});
  371. $fqdn=~s/\.$ad_zone$//i;
  372. # $fqdn=~s/\.$//;
  373. if (!$dns_cmd->{value}) { next; }
  374. $fqdn_ip=lc($dns_cmd->{value});
  375. $fqdn = $fqdn.".".$ad_zone;
  376. #dns update disabled?
  377. my $maybe_update_dns=( $enable_ad_dns_update and $office_networks->match_string($fqdn_ip) );
  378. if (!$maybe_update_dns) {
  379. db_log_info($hdb,"FOUND Auth_id: $auth_id. DNS update disabled.");
  380. next;
  381. }
  382. #get aliases
  383. my @aliases = get_records_sql($hdb,"SELECT * FROM user_auth_alias WHERE auth_id=".$auth_id);
  384. #remove A & PTR
  385. if ($dns_cmd->{operation_type} eq 'del') {
  386. #remove aliases
  387. if (@aliases and scalar @aliases) {
  388. foreach my $alias (@aliases) {
  389. delete_dns_cname($fqdn,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  390. delete_dns_hostname($fqdn,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  391. }
  392. }
  393. #remove main record
  394. delete_dns_hostname($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  395. delete_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  396. }
  397. #create A & PTR
  398. if ($dns_cmd->{operation_type} eq 'add') {
  399. my @dns_record=ResolveNames($fqdn,$dns_server);
  400. $static_exists = (scalar @dns_record>0);
  401. if ($static_exists) {
  402. $static_ref = join(' ',@dns_record);
  403. foreach my $dns_a (@dns_record) {
  404. if ($dns_a=~/^$fqdn_ip$/) { $static_ok = 1; }
  405. }
  406. db_log_debug($hdb,"Dns record for static record $fqdn: $static_ref");
  407. }
  408. #skip update if already exists
  409. if ($static_ok) {
  410. db_log_debug($hdb,"Static record for $fqdn [$static_ok] correct.");
  411. next;
  412. }
  413. #create record
  414. create_dns_hostname($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  415. create_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  416. #create aliases
  417. if (@aliases and scalar @aliases) {
  418. foreach my $alias (@aliases) {
  419. create_dns_cname($fqdn,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  420. }
  421. }
  422. }
  423. }
  424. #PTR
  425. if ($dns_cmd->{name_type}=~/^ptr$/i) {
  426. $fqdn=lc($dns_cmd->{name});
  427. $fqdn=~s/\.$ad_zone$//i;
  428. # $fqdn=~s/\.$//;
  429. if (!$dns_cmd->{value}) { next; }
  430. $fqdn_ip=lc($dns_cmd->{value});
  431. #skip update unknown domain
  432. if ($fqdn =~/\.$/) { next; }
  433. $fqdn = $fqdn.".".$ad_zone;
  434. #dns update disabled?
  435. my $maybe_update_dns=( $enable_ad_dns_update and $office_networks->match_string($fqdn_ip) );
  436. if (!$maybe_update_dns) {
  437. db_log_info($hdb,"FOUND Auth_id: $auth_id. DNS update disabled.");
  438. next;
  439. }
  440. #remove A & PTR
  441. if ($dns_cmd->{operation_type} eq 'del') {
  442. #remove main record
  443. delete_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  444. }
  445. #create A & PTR
  446. if ($dns_cmd->{operation_type} eq 'add') {
  447. #create record
  448. create_dns_ptr($fqdn,$fqdn_ip,$ad_zone,$ad_dns,$hdb);
  449. }
  450. }
  451. };
  452. if ($@) { log_error("Error dns commands: $@"); }
  453. }
  454. }
  455. #---------------------------------------------------------------------------------------------------------------
  456. sub is_ad_computer {
  457. my $hdb = shift;
  458. my $computer_name = shift;
  459. if (!$computer_name or $computer_name =~/UNDEFINED/i) { return 0; }
  460. my $ad_check = get_option($hdb,73);
  461. if (!$ad_check) { return 1; }
  462. my $ad_zone = get_option($hdb,33);
  463. if ($computer_name =~/\./) {
  464. if ($computer_name!~/\.$ad_zone$/i) {
  465. db_log_verbose($hdb,"The domain of the computer $computer_name does not match the domain of the organization $ad_zone. Skip update.");
  466. return 0;
  467. }
  468. }
  469. if ($computer_name =~/^(.+)\./) {
  470. $computer_name = $1;
  471. }
  472. my $ad_computer_name = trim($computer_name).'$';
  473. my $name_in_cache = get_record_sql($hdb,"SELECT * FROM ad_comp_cache WHERE name='".$computer_name."'");
  474. if ($name_in_cache) { return 1; }
  475. my %name_found=do_exec_ref('/usr/bin/getent passwd '.$ad_computer_name);
  476. if (!$name_found{output} or $name_found{status} ne 0) {
  477. db_log_verbose($hdb,"The computer ".uc($ad_computer_name)." was not found in the domain $ad_zone. Skip update.");
  478. return 0;
  479. }
  480. do_sql($hdb,"INSERT INTO ad_comp_cache(name) VALUES('".$computer_name."') ON DUPLICATE KEY UPDATE name='".$computer_name."';");
  481. return 1;
  482. }
  483. #---------------------------------------------------------------------------------------------------------------
  484. sub update_dns_record_by_dhcp {
  485. my $hdb = shift;
  486. my $dhcp_record = shift;
  487. my $auth_record = shift;
  488. return if (!$config_ref{enable_dns_updates});
  489. my $ad_zone = get_option($hdb,33);
  490. my $ad_dns = get_option($hdb,3);
  491. $update_hostname_from_dhcp = get_option($hdb,46) || 0;
  492. my $subnets_dhcp = get_subnets_ref($hdb);
  493. my $enable_ad_dns_update = ($ad_zone and $ad_dns and $update_hostname_from_dhcp);
  494. log_debug("Dhcp record: ".Dumper($dhcp_record));
  495. log_debug("Subnets: ".Dumper($subnets_dhcp->{$dhcp_record->{network}->{subnet}}));
  496. log_debug("enable_ad_dns_update: ".$enable_ad_dns_update);
  497. log_debug("DNS update flags - zone: ".$ad_zone.",dns: ".$ad_dns.", update_hostname_from_dhcp: ".$update_hostname_from_dhcp.", enable_ad_dns_update: ".$enable_ad_dns_update. ", network dns-update enabled: ".$subnets_dhcp->{$dhcp_record->{network}->{subnet}}->{dhcp_update_hostname});
  498. my $maybe_update_dns=($enable_ad_dns_update and $subnets_dhcp->{$dhcp_record->{network}->{subnet}}->{dhcp_update_hostname} and (is_ad_computer($hdb,$dhcp_record->{hostname_utf8}) and ($dhcp_record->{type}=~/add/i or $dhcp_record->{type}=~/old/i)));
  499. if (!$maybe_update_dns) {
  500. db_log_debug($hdb,"FOUND Auth_id: $auth_record->{id}. DNS update don't needed.");
  501. return 0;
  502. }
  503. log_debug("DNS update enabled.");
  504. #update dns block
  505. my $fqdn_static;
  506. if ($auth_record->{dns_name}) {
  507. $fqdn_static=lc($auth_record->{dns_name});
  508. if ($fqdn_static!~/\.$ad_zone$/i) {
  509. $fqdn_static=~s/\.$//;
  510. $fqdn_static=lc($fqdn_static.'.'.$ad_zone);
  511. }
  512. }
  513. my $fqdn=lc(trim($dhcp_record->{hostname_utf8}));
  514. if ($fqdn!~/\.$ad_zone$/i) {
  515. $fqdn=~s/\.$//;
  516. $fqdn=lc($fqdn.'.'.$ad_zone);
  517. }
  518. db_log_debug($hdb,"FOUND Auth_id: $auth_record->{id} dns_name: $fqdn_static dhcp_hostname: $fqdn");
  519. #check exists static dns name
  520. my $static_exists = 0;
  521. my $dynamic_exists = 0;
  522. my $static_ok = 0;
  523. my $dynamic_ok = 0;
  524. my $static_ref;
  525. my $dynamic_ref;
  526. if ($fqdn_static ne '') {
  527. my @dns_record=ResolveNames($fqdn_static,$dns_server);
  528. $static_exists = (scalar @dns_record>0);
  529. if ($static_exists) {
  530. $static_ref = join(' ',@dns_record);
  531. foreach my $dns_a (@dns_record) {
  532. if ($dns_a=~/^$dhcp_record->{ip}$/) { $static_ok = $dns_a; }
  533. }
  534. }
  535. } else { $static_ok = 1; }
  536. if ($fqdn ne '') {
  537. my @dns_record=ResolveNames($fqdn,$dns_server);
  538. $dynamic_exists = (scalar @dns_record>0);
  539. if ($dynamic_exists) {
  540. $dynamic_ref = join(' ',@dns_record);
  541. foreach my $dns_a (@dns_record) {
  542. if ($dns_a=~/^$dhcp_record->{ip}$/) { $dynamic_ok = $dns_a; }
  543. }
  544. }
  545. }
  546. db_log_debug($hdb,"Dns record for static record $fqdn_static: $static_ok");
  547. db_log_debug($hdb,"Dns record for dhcp-hostname $fqdn: $dynamic_ok");
  548. if ($fqdn_static ne '') {
  549. if (!$static_ok) {
  550. db_log_info($hdb,"Static record mismatch! Expected $fqdn_static => $dhcp_record->{ip}, recivied: $static_ref");
  551. if (!$static_exists) {
  552. db_log_info($hdb,"Static dns hostname defined but not found. Create it ($fqdn_static => $dhcp_record->{ip})!");
  553. create_dns_hostname($fqdn_static,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  554. }
  555. } else {
  556. db_log_debug($hdb,"Static record for $fqdn_static [$static_ok] correct.");
  557. }
  558. }
  559. if ($fqdn ne '' and $dynamic_ok ne '') { db_log_debug($hdb,"Dynamic record for $fqdn [$dynamic_ok] correct. No changes required."); }
  560. if ($fqdn ne '' and !$dynamic_ok) {
  561. log_error("Dynamic record mismatch! Expected: $fqdn => $dhcp_record->{ip}, recivied: $dynamic_ref. Checking the status.");
  562. #check exists hostname
  563. my $another_hostname_exists = 0;
  564. my $hostname_filter = ' LOWER(dns_name) REGEXP("^'.lc($dhcp_record->{hostname_utf8}).'\.*$")';
  565. if ($fqdn_static ne '' and $fqdn !~/$fqdn_static/) {
  566. $hostname_filter = $hostname_filter . ' or LOWER(dns_name) REGEXP("^'.lc($auth_record->{dns_name}).'\.*$")';
  567. }
  568. #check exists another records with some static hostname
  569. my $filter_sql = 'SELECT * FROM user_auth WHERE id<>'.$auth_record->{id}.' and deleted=0 and ('.$hostname_filter.') ORDER BY last_found DESC';
  570. db_log_debug($hdb,"Search dhcp hostname by: ".$filter_sql);
  571. my $name_record = get_record_sql($hdb,$filter_sql);
  572. if ($name_record->{dns_name} =~/^$fqdn$/i or $name_record->{dns_name} =~/^$dhcp_record->{hostname_utf8}$/i) {
  573. $another_hostname_exists = 1;
  574. }
  575. if (!$another_hostname_exists) {
  576. if ($fqdn_static and $fqdn_static ne '') {
  577. if ($fqdn_static!~/$fqdn/) {
  578. db_log_info($hdb,"Hostname from dhcp request $fqdn differs from static dns hostname $fqdn_static. Ignore dynamic binding!");
  579. # delete_dns_hostname($fqdn,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  580. # create_dns_hostname($fqdn,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  581. }
  582. } else {
  583. db_log_info($hdb,"Rewrite aliases if exists for $fqdn => $dhcp_record->{ip}");
  584. #get and remove aliases
  585. my @aliases = get_records_sql($hdb,"SELECT * FROM user_auth_alias WHERE auth_id=".$auth_record->{id});
  586. if (@aliases and scalar @aliases) {
  587. foreach my $alias (@aliases) {
  588. delete_dns_cname($fqdn_static,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  589. }
  590. }
  591. db_log_info($hdb,"Static dns hostname not defined. Create dns record by dhcp request. $fqdn => $dhcp_record->{ip}");
  592. create_dns_hostname($fqdn,$dhcp_record->{ip},$ad_zone,$ad_dns,$hdb);
  593. if (@aliases and scalar @aliases) {
  594. foreach my $alias (@aliases) {
  595. create_dns_cname($fqdn_static,$alias->{alias},$ad_zone,$ad_dns,$hdb) if ($alias->{alias});
  596. }
  597. }
  598. }
  599. } else {
  600. db_log_error($hdb,"Found another record with some hostname id: $name_record->{id} ip: $name_record->{ip} hostname: $name_record->{dns_name}. Skip update.");
  601. }
  602. }
  603. #end update dns block
  604. }
  605. #------------------------------------------------------------------------------------------------------------
  606. sub apply_device_lock {
  607. my $db = shift;
  608. my $device_id = shift;
  609. my $iteration = shift || 0;
  610. $iteration++;
  611. if ($iteration>2) { return 0; }
  612. my $dev = get_record_sql($db,"SELECT discovery_locked, locked_timestamp, UNIX_TIMESTAMP(locked_timestamp) as u_locked_timestamp FROM devices WHERE id=".$device_id);
  613. if (!$dev) { return 0; }
  614. if (!$dev->{'discovery_locked'}) { return set_lock_discovery($db,$device_id); }
  615. #if timestamp undefined, set and return
  616. if (!$dev->{'locked_timestamp'}) { return set_lock_discovery($db,$device_id); }
  617. #wait for discovery
  618. my $wait_time = $dev->{'locked_timestamp'} + 30 - time();
  619. if ($wait_time<0) { return set_lock_discovery($db,$device_id); }
  620. sleep($wait_time);
  621. return apply_device_lock($db,$device_id,$iteration);
  622. }
  623. #------------------------------------------------------------------------------------------------------------
  624. sub set_lock_discovery {
  625. my $db = shift;
  626. my $device_id = shift;
  627. my $new;
  628. $new->{'discovery_locked'} = 1;
  629. $new->{'locked_timestamp'} = GetNowTime();
  630. if (update_record($db,'devices',$new,'id='.$device_id)) { return 1; }
  631. return 0;
  632. }
  633. #------------------------------------------------------------------------------------------------------------
  634. sub unset_lock_discovery {
  635. my $db = shift;
  636. my $device_id = shift;
  637. my $new;
  638. $new->{'discovery_locked'} = 0;
  639. $new->{'locked_timestamp'} = GetNowTime();
  640. if (update_record($db,'devices',$new,'id='.$device_id)) { return 1; }
  641. return 0;
  642. }
  643. #------------------------------------------------------------------------------------------------------------
  644. sub create_dns_cname {
  645. my $fqdn = shift;
  646. my $alias = shift;
  647. my $zone = shift;
  648. my $server = shift;
  649. my $db = shift;
  650. #skip update domain controllers
  651. if (!$db) {
  652. log_info("DNS-UPDATE: Add => Zone $zone Server: $server CNAME: $alias for $fqdn");
  653. } else {
  654. db_log_info($db,"DNS-UPDATE: Add => Zone $zone Server: $server CNAME: $alias for $fqdn ");
  655. }
  656. my $ad_zone = get_option($db,33);
  657. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  658. my @add_dns;
  659. if ($config_ref{dns_server_type}=~/windows/i) {
  660. push(@add_dns,"gsstsig");
  661. push(@add_dns,"server $server");
  662. push(@add_dns,"zone $zone");
  663. push(@add_dns,"update add $alias 3600 cname $fqdn.");
  664. push(@add_dns,"send");
  665. write_to_file($nsupdate_file,\@add_dns);
  666. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  667. }
  668. if ($config_ref{dns_server_type}=~/bind/i) {
  669. push(@add_dns,"server $server");
  670. push(@add_dns,"zone $zone");
  671. push(@add_dns,"update add $alias 3600 cname $fqdn.");
  672. push(@add_dns,"send");
  673. write_to_file($nsupdate_file,\@add_dns);
  674. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  675. }
  676. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  677. }
  678. #---------------------------------------------------------------------------------------------------------------
  679. sub delete_dns_cname {
  680. my $fqdn = shift;
  681. my $alias = shift;
  682. my $zone = shift;
  683. my $server = shift;
  684. my $db = shift;
  685. if (!$db) {
  686. log_info("DNS-UPDATE: Delete => Zone $zone Server: $server CNAME: $alias for $fqdn ");
  687. } else {
  688. db_log_info($db,"DNS-UPDATE: Delete => Zone $zone Server: $server CNAME: $alias for $fqdn");
  689. }
  690. my $ad_zone = get_option($db,33);
  691. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  692. my @add_dns;
  693. if ($config_ref{dns_server_type}=~/windows/i) {
  694. push(@add_dns,"gsstsig");
  695. push(@add_dns,"server $server");
  696. push(@add_dns,"zone $zone");
  697. push(@add_dns,"update delete $alias cname ");
  698. push(@add_dns,"send");
  699. write_to_file($nsupdate_file,\@add_dns);
  700. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  701. }
  702. if ($config_ref{dns_server_type}=~/bind/i) {
  703. push(@add_dns,"server $server");
  704. push(@add_dns,"zone $zone");
  705. push(@add_dns,"update delete $alias cname");
  706. push(@add_dns,"send");
  707. write_to_file($nsupdate_file,\@add_dns);
  708. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  709. }
  710. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  711. }
  712. #------------------------------------------------------------------------------------------------------------
  713. sub create_dns_hostname {
  714. my $fqdn = shift;
  715. my $ip = shift;
  716. my $zone = shift;
  717. my $server = shift;
  718. my $db = shift;
  719. #skip update domain controllers
  720. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  721. if (!$db) {
  722. log_info("DNS-UPDATE: Add => Zone $zone Server: $server A: $fqdn IP: $ip");
  723. } else {
  724. db_log_info($db,"DNS-UPDATE: Add => Zone $zone Server: $server A: $fqdn IP: $ip");
  725. }
  726. my $ad_zone = get_option($db,33);
  727. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  728. my @add_dns;
  729. if ($config_ref{dns_server_type}=~/windows/i) {
  730. push(@add_dns,"gsstsig");
  731. push(@add_dns,"server $server");
  732. push(@add_dns,"zone $zone");
  733. push(@add_dns,"update add $fqdn 3600 A $ip");
  734. push(@add_dns,"send");
  735. write_to_file($nsupdate_file,\@add_dns);
  736. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  737. }
  738. if ($config_ref{dns_server_type}=~/bind/i) {
  739. push(@add_dns,"server $server");
  740. push(@add_dns,"zone $zone");
  741. push(@add_dns,"update add $fqdn 3600 A $ip");
  742. push(@add_dns,"send");
  743. write_to_file($nsupdate_file,\@add_dns);
  744. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  745. }
  746. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  747. }
  748. #---------------------------------------------------------------------------------------------------------------
  749. sub delete_dns_hostname {
  750. my $fqdn = shift;
  751. my $ip = shift;
  752. my $zone = shift;
  753. my $server = shift;
  754. my $db = shift;
  755. #skip update domain controllers
  756. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  757. if (!$db) {
  758. log_info("DNS-UPDATE: Delete => Zone $zone Server: $server A: $fqdn IP: $ip");
  759. } else {
  760. db_log_info($db,"DNS-UPDATE: Delete => Zone $zone Server: $server A: $fqdn IP: $ip");
  761. }
  762. my $ad_zone = get_option($db,33);
  763. my $nsupdate_file = "/tmp/".$fqdn."-nsupdate";
  764. my @add_dns;
  765. if ($config_ref{dns_server_type}=~/windows/i) {
  766. push(@add_dns,"gsstsig");
  767. push(@add_dns,"server $server");
  768. push(@add_dns,"zone $zone");
  769. push(@add_dns,"update delete $fqdn A");
  770. push(@add_dns,"send");
  771. write_to_file($nsupdate_file,\@add_dns);
  772. do_exec('/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"');
  773. }
  774. if ($config_ref{dns_server_type}=~/bind/i) {
  775. push(@add_dns,"server $server");
  776. push(@add_dns,"zone $zone");
  777. push(@add_dns,"update delete $fqdn A");
  778. push(@add_dns,"send");
  779. write_to_file($nsupdate_file,\@add_dns);
  780. do_exec('/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"');
  781. }
  782. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  783. }
  784. #---------------------------------------------------------------------------------------------------------------
  785. sub create_dns_ptr {
  786. my $fqdn = shift;
  787. my $ip = shift;
  788. my $ad_zone = shift;
  789. my $server = shift;
  790. my $db = shift;
  791. my $radr;
  792. my $zone;
  793. #skip update domain controllers
  794. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  795. if ($ip =~ /([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})(\/[0-9]{1,2}){0,1}/) {
  796. return 0 if($1 > 255 || $2 > 255 || $3 > 255 || $4 > 255);
  797. $radr = "$4.$3.$2.$1.in-addr.arpa";
  798. $zone = "$3.$2.$1.in-addr.arpa";
  799. }
  800. if (!$radr or !$zone) { return 0; }
  801. if (!$db) { return 0; }
  802. db_log_info($db,"DNS-UPDATE: Zone $zone Server: $server A: $fqdn PTR: $ip");
  803. my $nsupdate_file = "/tmp/".$radr."-nsupdate";
  804. my @add_dns;
  805. if ($config_ref{dns_server_type}=~/windows/i) {
  806. push(@add_dns,"gsstsig");
  807. push(@add_dns,"server $server");
  808. push(@add_dns,"zone $zone");
  809. push(@add_dns,"update add $radr 3600 PTR $fqdn.");
  810. push(@add_dns,"send");
  811. write_to_file($nsupdate_file,\@add_dns);
  812. my $run_cmd = '/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"';
  813. do_exec($run_cmd);
  814. }
  815. if ($config_ref{dns_server_type}=~/bind/i) {
  816. push(@add_dns,"server $server");
  817. push(@add_dns,"zone $zone");
  818. push(@add_dns,"update add $radr 3600 PTR $fqdn.");
  819. push(@add_dns,"send");
  820. write_to_file($nsupdate_file,\@add_dns);
  821. my $run_cmd = '/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"';
  822. do_exec($run_cmd);
  823. }
  824. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  825. }
  826. #---------------------------------------------------------------------------------------------------------------
  827. sub delete_dns_ptr {
  828. my $fqdn = shift;
  829. my $ip = shift;
  830. my $ad_zone = shift;
  831. my $server = shift;
  832. my $db = shift;
  833. my $radr;
  834. my $zone;
  835. #skip update domain controllers
  836. if ($fqdn=~/^dc[0-9]{1,2}\./i) { return; }
  837. if ($ip =~ /([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})(\/[0-9]{1,2}){0,1}/) {
  838. return 0 if($1 > 255 || $2 > 255 || $3 > 255 || $4 > 255);
  839. $radr = "$4.$3.$2.$1.in-addr.arpa";
  840. $zone = "$3.$2.$1.in-addr.arpa";
  841. }
  842. if (!$radr or !$zone) { return 0; }
  843. if (!$db) { return 0 ; }
  844. db_log_info($db,"DNS-UPDATE: Delete => Zone $zone Server: $server A: $fqdn PTR: $ip");
  845. my $nsupdate_file = "/tmp/".$radr."-nsupdate";
  846. my @add_dns;
  847. if ($config_ref{dns_server_type}=~/windows/i) {
  848. push(@add_dns,"gsstsig");
  849. push(@add_dns,"server $server");
  850. push(@add_dns,"zone $zone");
  851. push(@add_dns,"update delete $radr PTR");
  852. push(@add_dns,"send");
  853. write_to_file($nsupdate_file,\@add_dns);
  854. my $run_cmd = '/usr/bin/kinit -k -t /opt/Eye/scripts/cfg/dns_updater.keytab dns_updater@'.uc($ad_zone).' && /usr/bin/nsupdate "'.$nsupdate_file.'"';
  855. do_exec($run_cmd);
  856. }
  857. if ($config_ref{dns_server_type}=~/bind/i) {
  858. push(@add_dns,"server $server");
  859. push(@add_dns,"zone $zone");
  860. push(@add_dns,"update delete $radr PTR");
  861. push(@add_dns,"send");
  862. write_to_file($nsupdate_file,\@add_dns);
  863. my $run_cmd = '/usr/bin/nsupdate -k /etc/bind/rndc.key "'.$nsupdate_file.'"';
  864. do_exec($run_cmd);
  865. }
  866. if (-e "$nsupdate_file") { unlink "$nsupdate_file"; }
  867. }
  868. #---------------------------------------------------------------------------------------------------------------
  869. sub new_user {
  870. my $db = shift;
  871. my $user_info = shift;
  872. my $user;
  873. if ($user_info->{mac}) {
  874. $user->{login}=mac_splitted($user_info->{mac});
  875. } else {
  876. $user->{login}=$user_info->{ip};
  877. }
  878. if ($user_info->{dhcp_hostname}) { $user->{fio}=$user_info->{dhcp_hostname}; }
  879. if (!$user->{fio}) { $user->{fio}=$user_info->{ip}; }
  880. my $login_count = get_count_records($db,"user_list","(login LIKE '".$user->{login}."(%)') OR (login='".$user->{login}."')");
  881. if ($login_count) { $login_count++; $user->{login} .="(".$login_count.")"; }
  882. $user->{ou_id} = $user_info->{ou_id};
  883. my $ou_info = get_record_sql($db,"SELECT * FROM ou WHERE id=".$user_info->{'ou_id'});
  884. if ($ou_info) {
  885. $user->{'enabled'} = $ou_info->{'enabled'};
  886. $user->{'queue_id'} = $ou_info->{'queue_id'};
  887. $user->{'filter_group_id'} = $ou_info->{'filter_group_id'};
  888. }
  889. my $result = insert_record($db,"user_list",$user);
  890. if ($result and $config_ref{auto_mac_rule} and $user_info->{mac}) {
  891. my $auth_rule;
  892. $auth_rule->{user_id} = $result;
  893. $auth_rule->{rule_type} = 2;
  894. $auth_rule->{rule} = mac_splitted($user_info->{mac});
  895. insert_record($db,"auth_rules",$auth_rule);
  896. }
  897. return $result;
  898. }
  899. #---------------------------------------------------------------------------------------------------------------
  900. sub get_ip_subnet {
  901. my $db = shift;
  902. my $ip = shift;
  903. if (!$ip) { return; }
  904. my $ip_aton = StrToIp($ip);
  905. my $user_subnet = get_record_sql($db, "SELECT * FROM subnets WHERE hotspot=1 or office=1 and ( ".$ip_aton." >= ip_int_start and ".$ip_aton." <= ip_int_stop)");
  906. return $user_subnet;
  907. }
  908. #---------------------------------------------------------------------------------------------------------------
  909. sub find_mac_in_subnet {
  910. my $db = shift;
  911. my $ip = shift;
  912. my $mac = shift;
  913. if (!$ip or !$mac) { return; }
  914. my $ip_subnet = get_ip_subnet($db, $ip);
  915. if (!$ip_subnet) { return; }
  916. my @t_auth = get_records_sql($db, "SELECT * FROM user_auth WHERE ip_int>=" . $ip_subnet->{'ip_int_start'} . " and ip_int<=" . $ip_subnet->{'ip_int_stop'} . " and mac='" . $mac . "' and deleted=0 ORDER BY id");
  917. my $auth_count = 0;
  918. my $result;
  919. $result->{'count'} = 0;
  920. foreach my $row (@t_auth) {
  921. next if (!$row);
  922. $auth_count++;
  923. $result->{'count'} = $auth_count;
  924. $result->{items}{$auth_count} = $row;
  925. }
  926. return $result;
  927. }
  928. #---------------------------------------------------------------------------------------------------------------
  929. sub resurrection_auth {
  930. my $db = shift;
  931. my $ip_record = shift;
  932. my $ip = $ip_record->{'ip'};
  933. my $mac = $ip_record->{'mac'};
  934. my $action = $ip_record->{'type'};
  935. my $hostname = $ip_record->{'hostname_utf8'};
  936. my $client_id = $ip_record->{'client_id'};
  937. if (!exists $ip_record->{ip_aton}) { $ip_record->{ip_aton}=StrToIp($ip); }
  938. if (!exists $ip_record->{hotspot}) { $ip_record->{hotspot}=is_hotspot($db,$ip); }
  939. my $auth_ident = "Found new ip-address: " . $ip;
  940. $auth_ident = $auth_ident . ' ['.$mac .']' if ($mac);
  941. $auth_ident = $auth_ident . ' :: '.$hostname if ($hostname);
  942. my $ip_aton=$ip_record->{ip_aton};
  943. my $timestamp=GetNowTime();
  944. my $record=get_record_sql($db,'SELECT * FROM user_auth WHERE deleted=0 AND ip_int='.$ip_aton.' AND mac="'.$mac.'"');
  945. my $new_record;
  946. $new_record->{last_found}=$timestamp;
  947. $new_record->{arp_found}=$timestamp;
  948. if ($client_id) { $new_record->{'client_id'} = $client_id; }
  949. #auth found?
  950. if ($record->{user_id}) {
  951. #update timestamp and return
  952. if ($action=~/^(add|old|del)$/i) {
  953. $new_record->{dhcp_action}=$action;
  954. $new_record->{created_by}='dhcp';
  955. $new_record->{dhcp_time}=$timestamp;
  956. if ($hostname) { $new_record->{dhcp_hostname} = $hostname; }
  957. }
  958. update_record($db,'user_auth',$new_record,"id=$record->{id}");
  959. return $record->{id};
  960. }
  961. my $user_subnet=$office_networks->match_string($ip);
  962. if ($user_subnet->{static}) {
  963. db_log_warning($db,"Unknown ip+mac found in static subnet! Abort create record for ip: $ip mac: [".$mac."]");
  964. return 0;
  965. }
  966. my $send_alert_update = isNotifyUpdate(get_notify_subnet($db,$ip));
  967. my $send_alert_create = isNotifyCreate(get_notify_subnet($db,$ip));
  968. #my $send_alert_delete = isNotifyDelete(get_notify_subnet($db,$ip));
  969. my $mac_exists=find_mac_in_subnet($db,$ip,$mac);
  970. my $msg = '';
  971. #search changed mac
  972. $record=get_record_sql($db,'SELECT * FROM user_auth WHERE ip_int='.$ip_aton." and deleted=0");
  973. if ($record->{id}) {
  974. #if found record with same ip but without mac - update it
  975. if (!$record->{mac}) {
  976. $msg = $auth_ident. "\nUse auth record with no mac: " . hash_to_text($record);
  977. db_log_verbose($db,$msg);
  978. $new_record->{mac}=$mac;
  979. #disable dhcp for same mac in one ip subnet
  980. if ($mac_exists and $mac_exists->{'count'}) { $new_record->{dhcp}=0; }
  981. if ($action=~/^(add|old|del)$/i) {
  982. $new_record->{dhcp_action}=$action;
  983. $new_record->{dhcp_time}=$timestamp;
  984. $new_record->{created_by}='dhcp';
  985. if ($hostname) { $new_record->{dhcp_hostname} = $hostname; }
  986. }
  987. update_record($db,'user_auth',$new_record,"id=$record->{id}");
  988. sendEmail("WARN! ".get_first_line($msg),$msg,1) if ($send_alert_update);
  989. return $record->{id};
  990. }
  991. #if found record with same ip but another mac - delete old record
  992. if ($record->{mac}) {
  993. if (!$ip_record->{hotspot}) {
  994. my $msg = "For ip: $ip mac change detected! Old mac: [".$record->{mac}."] New mac: [".$mac."]. Disable old auth_id: $record->{id}";
  995. db_log_warning($db,$msg,$record->{id});
  996. sendEmail("WARN! ".get_first_line($msg),$msg,1) if ($send_alert_update);
  997. }
  998. delete_user_auth($db,$record->{id});
  999. }
  1000. }
  1001. #default user
  1002. my $new_user_info=get_new_user_id($db,$ip,$mac,$hostname);
  1003. my $new_user_id;
  1004. if ($new_user_info->{user_id}) { $new_user_id = $new_user_info->{user_id}; }
  1005. if (!$new_user_id) { $new_user_id = new_user($db,$new_user_info); }
  1006. if ($mac_exists) {
  1007. #deleting the user's entry if the address belongs to a dynamic group
  1008. foreach my $dup_record_id (keys %{$mac_exists->{items}}) {
  1009. my $dup_record = $mac_exists->{items}{$dup_record_id};
  1010. next if (!$dup_record);
  1011. #remove old dynamic record with some mac
  1012. if ($dup_record->{dynamic}) {
  1013. delete_user_auth($db,$dup_record->{id});
  1014. }
  1015. }
  1016. }
  1017. #recheck
  1018. $mac_exists=find_mac_in_subnet($db,$ip,$mac);
  1019. #disable dhcp for same mac in one ip subnet
  1020. if ($mac_exists and $mac_exists->{'count'}) { $new_record->{dhcp}=0; }
  1021. #seek old auth with same ip and mac
  1022. my $auth_exists=get_count_records($db,'user_auth',"ip_int=".$ip_aton." and mac='".$mac."'");
  1023. $new_record->{ip_int}=$ip_aton;
  1024. $new_record->{ip}=$ip;
  1025. $new_record->{mac}=$mac;
  1026. $new_record->{user_id}=$new_user_id;
  1027. $new_record->{save_traf}="$save_detail";
  1028. $new_record->{deleted}="0";
  1029. if ($action=~/^(add|old|del)$/i) {
  1030. $new_record->{dhcp_action}=$action;
  1031. $new_record->{dhcp_time}=$timestamp;
  1032. $new_record->{created_by}='dhcp';
  1033. } else {
  1034. $new_record->{created_by}=$action;
  1035. }
  1036. my $cur_auth_id= 0;
  1037. if ($auth_exists) {
  1038. #found ->Resurrection old record
  1039. my $resurrection_id = get_id_record($db,'user_auth',"ip_int=".$ip_aton." and mac='".$mac."'");
  1040. $msg = $auth_ident . " Resurrection auth_id: $resurrection_id with ip: $ip and mac: $mac";
  1041. if (!$ip_record->{hotspot}) { db_log_warning($db,$msg); } else { db_log_info($db,$msg); }
  1042. if (update_record($db,'user_auth',$new_record,"id=$resurrection_id")) { $cur_auth_id = $resurrection_id; }
  1043. } else {
  1044. #not found ->create new record
  1045. $msg = $auth_ident ."\n";
  1046. $cur_auth_id = insert_record($db,'user_auth',$new_record);
  1047. if ($cur_auth_id) {
  1048. if (!$ip_record->{hotspot}) { db_log_warning($db,$msg); } else { db_log_info($db,$msg); }
  1049. }
  1050. }
  1051. #filter and status
  1052. $cur_auth_id=get_id_record($db,'user_auth',"ip='$ip' and mac='$mac' and deleted=0 ORDER BY last_found DESC") if (!$cur_auth_id);
  1053. if ($cur_auth_id) {
  1054. my $user_record=get_record_sql($db,"SELECT * FROM user_list WHERE id=".$new_user_id);
  1055. if ($user_record) {
  1056. my $ou_info = get_record_sql($db,'SELECT * FROM ou WHERE id='.$user_record->{ou_id});
  1057. if ($ou_info and $ou_info->{'dynamic'}) {
  1058. # Устанавливаем значение по умолчанию, если не задано
  1059. if (!$ou_info->{'life_duration'}) {
  1060. $ou_info->{'life_duration'} = 24.0; # Явно указываем дробное число
  1061. }
  1062. my $now = DateTime->now(time_zone => 'local');
  1063. # Разбиваем life_duration на часы и минуты (для дробного значения)
  1064. my $hours = int($ou_info->{'life_duration'}); # Целая часть (часы)
  1065. my $minutes = ($ou_info->{'life_duration'} - $hours) * 60; # Дробная часть → минуты
  1066. # Создаём продолжительность с учётом дробных часов (в виде часов + минут)
  1067. my $duration = DateTime::Duration->new( hours => $hours, minutes => $minutes);
  1068. my $end_life = $now + $duration;
  1069. $new_record->{'dynamic'} = 1;
  1070. $new_record->{'end_life'} = $end_life->strftime('%Y-%m-%d %H:%M:%S');
  1071. }
  1072. $new_record->{ou_id}=$user_record->{ou_id};
  1073. $new_record->{description}=$user_record->{fio};
  1074. $new_record->{filter_group_id}=$user_record->{filter_group_id};
  1075. $new_record->{queue_id}=$user_record->{queue_id};
  1076. $new_record->{enabled}="$user_record->{enabled}";
  1077. update_record($db,'user_auth',$new_record,"id=$cur_auth_id");
  1078. }
  1079. db_log_warning($db, $msg, $cur_auth_id);
  1080. sendEmail("WARN! ".get_first_line($msg),$msg."\n".record_to_txt($db,'user_auth',$cur_auth_id),1) if ($send_alert_create);
  1081. } else { return; }
  1082. return $cur_auth_id;
  1083. }
  1084. #---------------------------------------------------------------------------------------------------------------
  1085. sub new_auth {
  1086. my $db = shift;
  1087. my $ip = shift;
  1088. my $ip_aton=StrToIp($ip);
  1089. my $record=get_record_sql($db,'SELECT id FROM user_auth WHERE deleted=0 AND ip_int='.$ip_aton);
  1090. if ($record->{id}) { return $record->{id}; }
  1091. #default user
  1092. my $new_user_info=get_new_user_id($db,$ip,undef,undef);
  1093. my $new_user_id;
  1094. if ($new_user_info->{user_id}) { $new_user_id = $new_user_info->{user_id}; }
  1095. if ($new_user_info->{ou_id}) { $new_user_id = new_user($db,$new_user_info); }
  1096. if (is_dynamic_ou($db,$new_user_info->{ou_id})) {
  1097. db_log_debug($db,"The ip-address $ip belongs to a dynamic group - ignore it.");
  1098. return;
  1099. }
  1100. my $send_alert = isNotifyCreate(get_notify_subnet($db,$ip));
  1101. my $user_record=get_record_sql($db,"SELECT * FROM user_list WHERE id=".$new_user_id);
  1102. my $timestamp=GetNowTime();
  1103. my $new_record;
  1104. $new_record->{ip_int}=$ip_aton;
  1105. $new_record->{ip}=$ip;
  1106. $new_record->{user_id}=$new_user_id;
  1107. $new_record->{save_traf}="$save_detail";
  1108. $new_record->{deleted}="0";
  1109. $new_record->{created_by}='netflow';
  1110. $new_record->{ou_id}=$user_record->{ou_id};
  1111. $new_record->{filter_group_id}=$user_record->{filter_group_id};
  1112. $new_record->{queue_id}=$user_record->{queue_id};
  1113. $new_record->{enabled}="$user_record->{enabled}";
  1114. if ($user_record->{fio}) { $new_record->{description}=$user_record->{fio}; }
  1115. my $cur_auth_id=insert_record($db,'user_auth',$new_record);
  1116. if ($cur_auth_id) {
  1117. my $msg = "New ip created by netflow! ip: $ip";
  1118. db_log_warning($db,$msg,$cur_auth_id);
  1119. sendEmail("WARN! ".get_first_line($msg),$msg,1) if ($send_alert);
  1120. }
  1121. return $cur_auth_id;
  1122. }
  1123. #--------------------------------------------------------------------------------------------------------------
  1124. sub get_dynamic_ou {
  1125. my $db = shift;
  1126. my @dynamic=();
  1127. my @ou_list = get_records_sql($db,"SELECT id FROM ou WHERE dynamic = 1");
  1128. foreach my $group (@ou_list) {
  1129. next if (!$group);
  1130. push(@dynamic,$group->{id});
  1131. }
  1132. return wantarray ? @dynamic : \@dynamic;
  1133. }
  1134. #--------------------------------------------------------------------------------------------------------------
  1135. sub get_default_ou {
  1136. my $db = shift;
  1137. my @dynamic=();
  1138. my $ou = get_record_sql($db,"SELECT id FROM ou WHERE default_users = 1");
  1139. if (!$ou) { push(@dynamic,0); } else { push(@dynamic,$ou->{'id'}); }
  1140. $ou = get_record_sql($db,"SELECT id FROM ou WHERE default_hotspot = 1");
  1141. if ($ou) { push(@dynamic,$ou->{id}); }
  1142. return wantarray ? @dynamic : \@dynamic;
  1143. }
  1144. #--------------------------------------------------------------------------------------------------------------
  1145. sub is_dynamic_ou {
  1146. my $db = shift;
  1147. my $ou_id = shift;
  1148. my @dynamic=get_dynamic_ou($db);
  1149. if (in_array(\@dynamic,$ou_id)) { return 1; }
  1150. return 0;
  1151. }
  1152. #--------------------------------------------------------------------------------------------------------------
  1153. sub is_default_ou {
  1154. my $db = shift;
  1155. my $ou_id = shift;
  1156. my @dynamic=get_default_ou($db);
  1157. if (in_array(\@dynamic,$ou_id)) { return 1; }
  1158. return 0;
  1159. }
  1160. #---------------------------------------------------------------------------------------------------------------
  1161. sub get_subnets_ref {
  1162. my $db = shift;
  1163. my @list=get_records_sql($db,'SELECT * FROM subnets ORDER BY ip_int_start');
  1164. my $list_ref;
  1165. foreach my $net (@list) {
  1166. next if (!$net->{subnet});
  1167. $list_ref->{$net->{subnet}}=$net;
  1168. }
  1169. return $list_ref;
  1170. }
  1171. #---------------------------------------------------------------------------------------------------------------
  1172. sub get_device_by_ip {
  1173. my $db = shift;
  1174. my $ip = shift;
  1175. my $netdev=get_record_sql($db,'SELECT * FROM devices WHERE ip="'.$ip.'"');
  1176. if ($netdev and $netdev->{id}>0) { return $netdev; }
  1177. my $auth_rec=get_record_sql($db,'SELECT user_id FROM user_auth WHERE ip="'.$ip.'" and deleted=0');
  1178. if ($auth_rec and $auth_rec->{user_id}>0) {
  1179. $netdev=get_record_sql($db,'SELECT * FROM devices WHERE user_id='.$auth_rec->{user_id});
  1180. return $netdev;
  1181. }
  1182. return;
  1183. }
  1184. #---------------------------------------------------------------------------------------------------------------
  1185. sub recalc_quotes {
  1186. my $db = shift;
  1187. my $calc_id = shift || $$;
  1188. return if (!get_option($db,54));
  1189. clean_variables($db);
  1190. return if (Get_Variable($db,'RECALC'));
  1191. my $timeshift = get_option($db,55);
  1192. Set_Variable($db,'RECALC',$calc_id,time()+$timeshift*60);
  1193. my $now = DateTime->now(time_zone=>'local');
  1194. my $day_start = $db->quote($now->ymd("-")." 00:00:00");
  1195. my $day_dur = DateTime::Duration->new( days => 1 );
  1196. my $tomorrow = $now+$day_dur;
  1197. my $day_stop = $db->quote($tomorrow->ymd("-")." 00:00:00");
  1198. $now->set(day=>1);
  1199. my $month_start=$db->quote($now->ymd("-")." 00:00:00");
  1200. my $month_dur = DateTime::Duration->new( months => 1 );
  1201. my $next_month = $now + $month_dur;
  1202. $next_month->set(day=>1);
  1203. my $month_stop = $db->quote($next_month->ymd("-")." 00:00:00");
  1204. #get user limits
  1205. my $user_auth_list_sql="SELECT A.id as auth_id, U.id, U.day_quota, U.month_quota, A.day_quota as auth_day, A.month_quota as auth_month FROM user_auth as A,user_list as U WHERE A.deleted=0 ORDER by user_id";
  1206. my @authlist_ref = get_records_sql($db,$user_auth_list_sql);
  1207. my %user_stats;
  1208. my %auth_info;
  1209. foreach my $row (@authlist_ref) {
  1210. $auth_info{$row->{auth_id}}{user_id}=$row->{id};
  1211. $auth_info{$row->{auth_id}}{day_limit}=$row->{auth_day};
  1212. $auth_info{$row->{auth_id}}{month_limit}=$row->{auth_month};
  1213. $auth_info{$row->{auth_id}}{day}=0;
  1214. $auth_info{$row->{auth_id}}{month}=0;
  1215. $user_stats{$row->{id}}{day_limit}=$row->{day_quota};
  1216. $user_stats{$row->{id}}{month_limit}=$row->{month_quota};
  1217. $user_stats{$row->{id}}{day}=0;
  1218. $user_stats{$row->{id}}{month}=0;
  1219. }
  1220. #recalc quotes - global
  1221. #day
  1222. my $day_sql="SELECT user_stats.auth_id, SUM( byte_in + byte_out ) AS traf_all FROM user_stats
  1223. WHERE user_stats.ts>= $day_start AND user_stats.ts< $day_stop GROUP BY user_stats.auth_id";
  1224. my @day_stats = get_records_sql($db,$day_sql);
  1225. foreach my $row (@day_stats) {
  1226. my $user_id=$auth_info{$row->{auth_id}}{user_id};
  1227. $auth_info{$row->{auth_id}}{day}=$row->{traf_all};
  1228. $user_stats{$user_id}{day}+=$row->{traf_all};
  1229. }
  1230. #month
  1231. my $month_sql="SELECT user_stats.auth_id, SUM( byte_in + byte_out ) AS traf_all FROM user_stats
  1232. WHERE user_stats.ts>= $month_start AND user_stats.ts< $month_stop GROUP BY user_stats.auth_id";
  1233. my @month_stats = get_records_sql($db,$month_sql);
  1234. foreach my $row (@month_stats) {
  1235. my $user_id=$auth_info{$row->{auth_id}}{user_id};
  1236. $auth_info{$row->{auth_id}}{month}=$row->{traf_all};
  1237. $user_stats{$user_id}{month}+=$row->{traf_all};
  1238. }
  1239. foreach my $auth_id (keys %auth_info) {
  1240. next if (!$auth_info{$auth_id}{day_limit});
  1241. next if (!$auth_info{$auth_id}{month_limit});
  1242. my $day_limit=$auth_info{$auth_id}{day_limit}*$KB*$KB;
  1243. my $month_limit=$auth_info{$auth_id}{month_limit}*$KB*$KB;
  1244. my $blocked_d=($auth_info{$auth_id}{day}>$day_limit);
  1245. my $blocked_m=($auth_info{$auth_id}{month}>$month_limit);
  1246. if ($blocked_d or $blocked_m) {
  1247. my $history_msg;
  1248. if ($blocked_d) { $history_msg=printf "Day quota limit found for auth_id: $auth_id - Current: %d Max: %d",$auth_info{$auth_id}{day},$day_limit; }
  1249. if ($blocked_m) { $history_msg=printf "Month quota limit found for auth_id: $auth_id - Current: %d Max: %d",$auth_info{$auth_id}{month},$month_limit; }
  1250. do_sql($db,"UPDATE user_auth set blocked=1, changed=1 where id=$auth_id");
  1251. db_log_verbose($db,$history_msg);
  1252. }
  1253. }
  1254. foreach my $user_id (keys %user_stats) {
  1255. next if (!$user_stats{$user_id}{day_limit});
  1256. next if (!$user_stats{$user_id}{month_limit});
  1257. my $day_limit=$user_stats{$user_id}{day_limit}*$KB*$KB;
  1258. my $month_limit=$user_stats{$user_id}{month_limit}*$KB*$KB;
  1259. my $blocked_d=($user_stats{$user_id}{day}>$day_limit);
  1260. my $blocked_m=($user_stats{$user_id}{month}>$month_limit);
  1261. if ($blocked_d or $blocked_m) {
  1262. my $history_msg;
  1263. if ($blocked_d) { $history_msg=printf "Day quota limit found for user_id: $user_id - Current: %d Max: %d",$user_stats{$user_id}{day},$day_limit; }
  1264. if ($blocked_m) { $history_msg=printf "Month quota limit found for user_id: $user_id - Current: %d Max: %d",$user_stats{$user_id}{month},$month_limit; }
  1265. do_sql($db,"UPDATE User_user set blocked=1 where id=$user_id");
  1266. do_sql($db,"UPDATE user_auth set blocked=1, changed=1 where user_id=$user_id");
  1267. db_log_verbose($db,$history_msg);
  1268. }
  1269. }
  1270. Del_Variable($db,'RECALC');
  1271. }
  1272. #--------------------------------------------------------------------------------
  1273. sub process_dhcp_request {
  1274. my ($db, $type, $mac, $ip, $hostname, $client_id, $circuit_id, $remote_id) = @_;
  1275. return if (!$type);
  1276. return if ($type!~/(old|add|del)/i);
  1277. my $client_hostname='';
  1278. if ($hostname and ($hostname ne "undef" or $hostname !~ /UNDEFINED/i)) { $client_hostname=$hostname; }
  1279. my $auth_network = $office_networks->match_string($ip);
  1280. if (!$auth_network) {
  1281. log_error("Unknown network in dhcp request! IP: $ip");
  1282. return;
  1283. }
  1284. if (!$circuit_id) { $circuit_id=''; }
  1285. if (!$client_id) { $client_id = ''; }
  1286. if (!$remote_id) { $remote_id = ''; }
  1287. my $timestamp=time();
  1288. my $ip_aton=StrToIp($ip);
  1289. $mac=mac_splitted(isc_mac_simplify($mac));
  1290. my $dhcp_event_time = GetNowTime($timestamp);
  1291. my $dhcp_record;
  1292. $dhcp_record->{'mac'}=$mac;
  1293. $dhcp_record->{'ip'}=$ip;
  1294. $dhcp_record->{'ip_aton'}=$ip_aton;
  1295. $dhcp_record->{'hostname'}=$client_hostname;
  1296. $dhcp_record->{'network'}=$auth_network;
  1297. $dhcp_record->{'type'}=$type;
  1298. $dhcp_record->{'hostname_utf8'}=$client_hostname;
  1299. $dhcp_record->{'ts'} = $timestamp;
  1300. $dhcp_record->{'last_time'} = time();
  1301. $dhcp_record->{'circuit_id'} = $circuit_id;
  1302. $dhcp_record->{'client_id'} = $client_id;
  1303. $dhcp_record->{'remote_id'} = $remote_id;
  1304. $dhcp_record->{'hotspot'}=is_hotspot($dbh,$dhcp_record->{ip});
  1305. #search actual record
  1306. my $auth_record = get_record_sql($db,'SELECT * FROM user_auth WHERE ip="'.$dhcp_record->{ip}.'" and mac="'.$mac.'" and deleted=0 ORDER BY last_found DESC');
  1307. #if record not found and type del => next event
  1308. if (!$auth_record and $type eq 'del') { return; }
  1309. #if record not found - create it
  1310. if (!$auth_record and $type=~/(add|old)/i) {
  1311. # db_log_warning($db,"Record for dhcp request type: ".$type." ip=".$dhcp_record->{ip}." and mac=".$mac." does not exists!");
  1312. my $res_id = resurrection_auth($db,$dhcp_record);
  1313. if (!$res_id) { db_log_error($db,"Error creating an ip address record for ip=".$dhcp_record->{ip}." and mac=".$mac."!"); return; }
  1314. $auth_record = get_record_sql($db,'SELECT * FROM user_auth WHERE id='.$res_id);
  1315. db_log_info($db,"Check for new auth. Found id: $res_id",$res_id);
  1316. }
  1317. my $auth_id = $auth_record->{id};
  1318. my $auth_ou_id = $auth_record->{ou_id};
  1319. $dhcp_record->{'auth_id'} = $auth_id;
  1320. $dhcp_record->{'auth_ou_id'} = $auth_ou_id;
  1321. log_debug(uc($type).">>");
  1322. log_debug("MAC: ".$dhcp_record->{'mac'});
  1323. log_debug("IP: ".$dhcp_record->{'ip'});
  1324. log_debug("CIRCUIT-ID: ".$dhcp_record->{circuit_id});
  1325. log_debug("REMOTE-ID: ".$dhcp_record->{remote_id});
  1326. log_debug("HOSTNAME: ".$dhcp_record->{'hostname'});
  1327. log_debug("TYPE: ".$dhcp_record->{'type'});
  1328. log_debug("TIME: ".$dhcp_event_time);
  1329. log_debug("AUTH_ID: ".$auth_id);
  1330. log_debug("END GET");
  1331. update_dns_record_by_dhcp($db,$dhcp_record,$auth_record);
  1332. if ($type=~/add/i and $dhcp_record->{hostname_utf8}) {
  1333. my $auth_rec;
  1334. $auth_rec->{dhcp_hostname} = $dhcp_record->{hostname_utf8};
  1335. $auth_rec->{dhcp_time}=$dhcp_event_time;
  1336. $auth_rec->{arp_found}=$dhcp_event_time;
  1337. $auth_rec->{created_by}='dhcp';
  1338. db_log_verbose($db,"Add lease by dhcp event for dynamic clients id: $auth_id ip: $dhcp_record->{ip}",$auth_id);
  1339. update_record($db,'user_auth',$auth_rec,"id=$auth_id");
  1340. }
  1341. if ($type=~/old/i) {
  1342. my $auth_rec;
  1343. $auth_rec->{dhcp_action}=$type;
  1344. $auth_rec->{dhcp_time}=$dhcp_event_time;
  1345. $auth_rec->{created_by}='dhcp';
  1346. $auth_rec->{arp_found}=$dhcp_event_time;
  1347. db_log_verbose($db,"Update lease by dhcp event for dynamic clients id: $auth_id ip: $dhcp_record->{ip}",$auth_id);
  1348. update_record($db,'user_auth',$auth_rec,"id=$auth_id");
  1349. }
  1350. if ($type=~/del/i and $auth_id) {
  1351. if ($auth_record->{dhcp_time} =~ /([0-9]{4})-([0-9]{2})-([0-9]{2}) ([0-9]{2}):([0-9]{2}):([0-9]{2})/) {
  1352. my $d_time = mktime($6,$5,$4,$3,$2-1,$1-1900);
  1353. if (time()-$d_time>60 and (is_dynamic_ou($db,$auth_ou_id) or is_default_ou($db,$auth_ou_id))) {
  1354. db_log_info($db,"Remove user ip record by dhcp release event for dynamic clients id: $auth_id ip: $dhcp_record->{ip}",$auth_id);
  1355. my $auth_rec;
  1356. $auth_rec->{dhcp_action}=$type;
  1357. $auth_rec->{dhcp_time}=$dhcp_event_time;
  1358. update_record($db,'user_auth',$auth_rec,"id=$auth_id");
  1359. #remove user auth record if it belongs to the default pool or it is dynamic
  1360. if (is_default_ou($db,$auth_ou_id) or (is_dynamic_ou($db,$auth_ou_id) and $auth_record->{dynamic})) {
  1361. delete_user_auth($db,$auth_id);
  1362. my $u_count=get_count_records($db,'user_auth','deleted=0 and user_id='.$auth_record->{'user_id'});
  1363. if (!$u_count) { delete_user($db,$auth_record->{'user_id'}); }
  1364. }
  1365. }
  1366. }
  1367. }
  1368. if ($dhcp_record->{hotspot} and $ignore_hotspot_dhcp_log) { return $dhcp_record; }
  1369. if ($ignore_update_dhcp_event and $type=~/old/i) { return $dhcp_record; }
  1370. my $dhcp_log;
  1371. if (!$auth_id) { $auth_id=0; }
  1372. $dhcp_log->{'auth_id'} = $auth_id;
  1373. $dhcp_log->{'ip'} = $dhcp_record->{'ip'};
  1374. $dhcp_log->{'ip_int'} = $dhcp_record->{'ip_aton'};
  1375. $dhcp_log->{'mac'} = $dhcp_record->{'mac'};
  1376. $dhcp_log->{'action'} = $type;
  1377. $dhcp_log->{'dhcp_hostname'} = $dhcp_record->{'hostname_utf8'};
  1378. $dhcp_log->{'ts'} = $dhcp_event_time;
  1379. $dhcp_log->{'circuit_id'} = $circuit_id;
  1380. $dhcp_log->{'client_id'} = $client_id;
  1381. $dhcp_log->{'remote_id'} = $remote_id;
  1382. insert_record($db,'dhcp_log',$dhcp_log);
  1383. return $dhcp_record;
  1384. }
  1385. 1;
  1386. }